Text Material Preview
300-410 Exam Name: Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Full version: 573 Q&As Full version of 300-410 Dumps Share some 300-410 exam dumps below. 1. A network administrator added a new spoke site with dynamic IP on the DMVPN network. Which configuration command passes traffic on the DMVPN tunnel from the spoke router? A. ip nhrp registration ignore B. ip nhrp registration no-registration 1 / 112 https://www.certqueen.com/300-410.html C. ip nhrp registration dynamic D. ip nhrp registration no-unique Answer: D 2. Refer to the exhibit. 2 / 112 AS 111 mut not be used as a transit AS, but ISP-1 is getting ISP-2 routes from AS 111. Which configuration stops Customer AS from being used as a transit path on ISP-1? A. ip as-path access-list 1 permit ^$ B. ip as-path access-list 1 permit_111_ C. ip as-path access-list 1 permit." D. ip as-path access-list 1 permit ^111$ Answer: A 3. DRAG DROP An engineer must establish a connection between two CE routers for two customers with overlapping IP addresses Customer_a is connected to interfaces Gig0/0, and Customer_b is connected to interfaces Gig0/1. Routers CE1 and CE2 are configured as follows: Drag and drop the code snippets from the right onto the boxes in the configuration to establish the needed connection. Snippets may be used more than once. 3 / 112 Answer: 4 / 112 4. Refer to the exhibit. 5 / 112 The route to 192 168 200 0 is flapping between R1 and R2. Which set of configuration changes resolves the flapping route? 6 / 112 A. Option A B. Option B C. Option C D. Option D Answer: D 5. Refer to the exhibit. 7 / 112 An engineer configures router A to mark all inside to outside traffic from network 192 168 1 0, except from host 192 168 1 1. with critical IP precedence. The policy did not work as expected. Which configuration resolves the issue? A) B) 8 / 112 C) D) 9 / 112 A. Option B. Option C. Option D. Option Answer: A 6. Refer to the exhibit. Which action resolves the issue? A. Establish connectivity between the NTP server and the switch. B. Configure the local time on Cisco DNA Center C. Configure the local time on the SW1 device D. Establish connectivity between the NTP server and Cisco DNA Center. Answer: C 7. Refer to the exhibit. 10 / 112 An engineer implemented CoPP to limit Telnet traffic to protect the router CPU. It was noticed that the Telnet traffic did not pass through CoPP. Which configuration resolves the issue? A. Option A B. Option B C. Option C D. Option D Answer: D 8. Refer to the exhibit. 11 / 112 Which interface configuration must be configured on the HUB router to enable MVPN with mGRE mode? 12 / 112 A. Option A B. Option B C. Option C D. Option D Answer: C Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_dmvpn/configuration/15-mt/sec- conn-dmvpn-15-mt-book/sec-conn-dmvpn-dmvpn.html 9. Refer to the exhibit. 13 / 112 An engineer configures the router 10.1.100.10 for EIGRP auto summarization so that R1 should receive the summary route of 10.0.0.0/8. However, R1 receives more specific /24 routes. Which action resolves this issue? A. Router R1 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface. B. Router R1 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are received on R1. C. Router 10.1.100.10 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are summarized toward R1. D. Router 10.1.100.10 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface. Answer: D 10. 16.0/20 11. DRAG DROP Drag and drop the packet types from the left onto the correct descriptions on the right. Answer: 14 / 112 Explanation: Unlike legacy network technologies such as ISDN, Frame Relay, and ATM that defined separate data and control channels, IP carries all packets within a single pipe. Thus, IP network devices such as routers and switches must be able to distinguish between data plane, control plane, and management plane packets to treat each packet appropriately. From an IP traffic plane perspective, packets may be divided into four distinct, logical groups: 12. Which control plane process allows the MPLS forwarding state to recover when a secondary RP takes over from a failed primary RP? A. MP-BGP uses control plane services for label prefix bindings in the MPLS forwarding table B. LSP uses NSF to recover from disruption *i control plane service C. FEC uses a control plane service to distribute information between primary and secondary processors D. LDP uses SSO to recover from disruption in control plane service Answer: C 13. How does an MPLS Layer 3 VPN differentiate the IP address space used between each VPN? A. by RD B. by address family C. by MP-BGP D. byRT Answer: A 14. DRAG DROP Drag and drop the MPLS terms from the left onto the correct definitions on the right. 15 / 112 Answer: 15. Refer to the exhibit. 16 / 112 An engineer implemented CoPP but did not see OSPF traffic going through it. Which configuration resolves the issue? A. ip access-list extended OSPF permit ospf any any B. policy-map COPP class OSFP police 8000 conform-action transmit exceed-action transmit violate-action drop C. control-plane service-policy input COPP D. class-map match-all OSFP match access-group name OSPF Answer: B 16. An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages? A. Configure the logging synchronous command B. Configure the no logging console debugging command globally C. Configure the logging synchronous level all command D. Configure the term no mon command globally Answer: A Explanation: Let’s see how the “logging synchronous” command affect the typing command: Without this command, a message may pop up and you may not know what you typed if that message is too long. When trying to erase (backspace) your command, you realize you are 17 / 112 erasing the message instead. With this command enabled, when a message pops up you will be put to a new line with your typing command which is very 17. Refer to the exhibit. 18 / 112 The output of the trace route from R5 shows a loop in the network. 19 / 112 Which configuration prevents this loop? A) B) 20 / 112 C) 21 / 112 D) 22 / 112 A. Option A B. Option B C. Option C D. Option D Answer: A Explanation: The reason for the loop is that R2 is forwarding the packets destined to 10.1.1.1 to R4, instead of R1. This is because in the redistribute OSPF statement, BW metric has a higher value and delay has a value of 1. So, R2 chooses R4 over R1 for 10.1.1.0/24 subnet causing a loop. Now, R5 learns 10.1.1.0/24 from R3 and advertises the same route to R4, that R4 redistributes back in EIGRP. If R3 sets a tag of 1 while redistributing EIGRP in OSPF, and R4 denies all the OSPF routes with tag 1 while redistributing, it will not advertise 10.1.1.0/24 back into EIGRP. Hence,the loop will be broken. 18. Refer to the exhibit. 23 / 112 24 / 112 An engineer configures DMVPN and receives the hub location prefix of 10.1.1.0724 on R2 and R3. The R3 prefix of 10 1.3.0/24 is not received on R2. and the R2 prefix 10.1,2.0/24 is not received on R3. Which action reserves the issue? A. Split horizon prevents the routes from being advertised between spoke routers it should be disabled with the command no ip split-horizon eigrp 10 on the tunnel interface of R1 B. There is no spoke-to-spoke connection DMVPN configuration should be modified to enable a tunnel connection between R2 and R3 and neighbor relationship confirmed by use of the show ip eigrp neighbor command C. Split horizon prevents the routes from being advertised between spoke routers it should be disabled with the no ip split-horizon eigrp 10 command on the Gi0/0 interface of R1. D. There is no spoke-to-spoke connection DMVPN configuration should be modified with a manual neighbor relationship configured between R2 and R3 and confirmed bb use of the show ip eigrp neighbor command. Answer: A Explanation: In this topology, the Hub router will receive advertisements from R2 Spoke router on its tunnel interface. The problem here is that it also has a connection with R3 Spoke on that same tunnel interface. If we don’t disable split-horizon, then the Hub will not relay routes from R2 to R3 and the other way around. That is because it received those routes on the same interface tunnel and therefore it cannot advertise back out that same interface (split-horizon rule). Therefore we must disable splithorizon on the Hub router to make sure the Spokes know about each other. 19. Refer to the exhibit. 25 / 112 An engineer noticed that the router log messages do not have any information about when the event occurred. Which action should the engineer take when enabling service time stamps to improve the logging functionality at a granular level? A. Configure the debug uptime option B. Configure the msec option C. Configure the timezone option D. Configure the tog uptime option Answer: D 20. Refer to the exhibit. 26 / 112 A customer reports that networks in the 10.0.1.0/24 space do not appear in the RIP database. What action resolves the issue? A. Remove summarization of 10.0.0.078. B. Permit 10.0.1.0/24 address in the ACL. C. Remove ACL on R1 blocking 10.0.1.0/24 network. D. Configure 10.0.1.0/24 network under RIP. Answer: A 21. Refer to the exhibit. A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messages, which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1? 27 / 112 A. no terminal monitor B. (config)#terminal no monitor C. #terminal no monitor D. (config)#no terminal monitor Answer: C Explanation: To turn off terminal monitor, use “terminal no monitor” in the enable mode 22. Refer to the exhibit. 28 / 112 SanFrancisco and Boston routers are choosing slower links to reach each other despite the direct links being up. Which configuration fixes the issue? 29 / 112 A. Option A B. Option B C. Option C D. Option D Answer: D 23. Refer to the exhibit. During ISP router maintenance, the network produced many alerts because of the flapping interface. Which configuration on R1 resolves the issue? A. no snmp trap link-status B. snmp trap link-status down C. snmp trap ip verify drop-rate D. ip verify drop-rate notify hold-down 60 Answer: D 24. Refer to the exhibit. 30 / 112 An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration? A. Add the aaa authentication login default none command to the global configuration. B. Replace the capital “C” with a lowercase “c” in the aaa authentication login Console local command. C. Add the aaa authentication login default group tacacs+ local-case command to the global configuration. D. Add the login authentication Console command to the line configuration Answer: D Explanation: Reference: https://community.cisco.com/t5/switching/how-to-define-login-local-for-console-0/td- p/2949493 25. Refer to the exhibit. 31 / 112 An engineer is troubleshooting a prefix advertisement issue from R3, which is not directly connected to R1. Which configuration resolves the issue? A) B) C) D) A. Option A B. Option B C. Option C 32 / 112 D. Option D Answer: A 26. An engineer creates a Cisco DNA Center cluster with three nodes, but all the services are running on one host node. Which action resolves this issue? A. Restore the link on the switch interface that is connected to a cluster link on the Cisco DNA Center B. Click the master host node with all the services and select services to be moved to other hosts C. Enable service distribution from the Systems 360 page. D. Click system updates, and upgrade to the latest version of Cisco DNA Center. Answer: C Explanation: To deploy Cisco DNA Center on a three-node cluster with High Availability (HA) enabled, complete the following procedure: Step 1: Configure Cisco DNA Center on the first node in your cluster… Step 2: Configure Cisco DNA Center on the second node in your cluster… Step 3: Configure Cisco DNA Center on the third node in your cluster… Step 4: Enable high availability on your cluster: a. In the Cisco DNA Center GUI, click and choose System Settings. The System 360 tab is displayed by default. b. In the Hosts area, click Enable Service Distribution. After you click Enable Service Distribution, Cisco DNA Center enters into maintenance mode. In this mode, Cisco DNA Center is unavailable until the redistribution of services is completed. You should take this into account when scheduling an HA deployment. Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automa tionand-management/dna- center/1-3-3-0/ha_guide/b_cisco_dna_center_ha_guide_1_3_3_0.html Therefore we can choose “Enable Service Distribution” to distribute services to other host nodes. 27. A DMVPN single hub topology is using IPsec + mGRE with OSPF. What should be configured on the hub to ensure it will be the designated router? A. tunnel interface of the hub with ip nhrp ospf dr B. OSPF priority to 0 33 / 112 C. route map to set the metrics of learned routes to 110 D. OSPF priority greater than 1 Answer: D Explanation: By default, the priority is 1 on all routers so we can set the OSPF priority of the hub to a value which is greater than 1 to make sure it would become the DR. 28. After some changes in the routing policy, it is noticed that the router in AS 45123 is being used as a transit AS router for several service provides. Which configuration ensures that the branch router in AS 45123 advertises only the local networks to all SP neighbors? A) B) C) D) 34 / 112 A. Option A B. Option B C. Option C D. Option D Answer: D Explanation: By default BGP advertises all prefixes to external BGP neighbors. This means that if you are multi-homed (connected to two or more ISPs) then you might become a transit AS. For example, ISP 2 in AS 200 can send traffic to your router in AS 100 to reach ISP 3 in AS 300 because you advertised prefixes in ISP 3 to ISP 2. This is what will be seen in the BGP routing table of ISP1: 29. Refer to the exhibit. 35 / 112 36 / 112 A network administrator is troubleshootingIPv6 address assignment for a DHCP client that is not getting an IPv6 address from the server. Which configuration retrieves the client IPv6 address from the DHCP server? A. ipv6 address autoconfig command on the interface B. ipv6 dhcp server automatic command on DHCP server C. ipv6 dhcp relay-agent command on the interface D. service dhcp command on DHCP server Answer: A 30. Which configuration feature should be used to block rogue router advertisements instead of using the IPv6 Router Advertisement Guard feature? A. VACL blocking broadcast frames from nonauthorized hosts B. PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes C. PVLANs with community ports associated to route advertisements and isolated ports for nodes D. IPv4 ACL blocking route advertisements from nonauthorized hosts Answer: B Explanation: The IPv6 Router Advertisement Guard feature provides support for allowing the network administrator to block or reject unwanted or rogue router advertisement guard messages that arrive at the network device platform. Router Advertisements are used by devices to announce themselves on the link. The IPv6 Router Advertisement Guard feature analyzes these router advertisements and filters out router advertisements that are sent by unauthorized devices. Certain switch platforms can already implement some level of rogue RA filtering by the administrator configuring Access Control Lists (ACLs) that block RA ICMP messages that might be inbound on “user” ports. Reference: https://datatracker.ietf.org/doc/html/rfc6104 31. Refer to the exhibit. 37 / 112 A) B) C) 38 / 112 D) A. Option B. Option C. Option D. Option Answer: A 32. The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped. access-list 100 permit ip host 172.16.1.99 any ! class-map CM-ADMIN match access-group 100 ! policy-map PM-COPP class CM-ADMIN police 500000 conform-action transmit ! interface E0/0 service-policy input PM-COPP CoPP failed to capture the desired traffic and the CPU load is getting higher. Which two configurations resolve the issue? (Choose two.) A. interface E0/0 no service-policy input PM-COPP ! 39 / 112 control-plane service-policy input PM-COPP B. policy-map PM-COPP class CM-ADMIN no police 500000 conform-action transmit police 500 conform-action transmit ! control-plane service-policy input PM-COPP C. no access-list 100 access-list 100 permit tcp host 172.16.1.99 any eq 80 D. no access-list 100 access-list 100 permit tcp host 172.16.1.99 any eq 80 access-list 100 permit tcp host 172.16.1.99 any eq 443 E. policy-map PM-COPP class CM-ADMIN no police 500000 conform-action transmit police 500 conform-action transmit Answer: A 33. A customer requested a GRE tunnel through the provider network between two customer sites using loopback to hide internal networks. Which configuration on R2 establishes the tunnel with R1? A. R2(config)# interface Tunnel 1 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1400 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 192.168.20.1 R2(config-if)# tunnel destination 192.168.10.1 B. R2(config)# interface Tunnel 1 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1400 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 10.10.2.2 R2(config-if)# tunnel destination 10.10.1.1 C. R2(config)# interface Tunnel 1 40 / 112 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1500 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 192.168.20.1 R2(config-if)# tunnel destination 10.10.1.1 D. R2(config)# interface Tunnel 1 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1500 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 10.10.2.2 R2(config-if)# tunnel destination 10.10.1.1 Answer: D 34. Refer to the exhibit. Users in VLAN46 cannot get the IP from the DHCP server. Assume that all the parameters are configured properly in VLAN 10 and on the DHCP server. Which command on interlace VLAN46 allows users to receive IP from the DHCP server? A. ip dhcp-addreos 10.221.10.10 B. ip dhcp server 10.221.10.10 C. ip helper-addrets 10.221.10.10 D. ip dhcp relay information trust-all Answer: C 35. Refer to the exhibit. 41 / 112 An administrator must harden a router, but the administrator failed to test the SSH access successfully to the router. Which action resolves the issue? A. Configure SSH on the remote device to log m using SSH B. SSH syntax must be ssh -I user ip to log in to the remote device C. Configure enable secret to log in to the device D. SSH must be allowed with the transport output ssh command Answer: B 36. Refer to the exhibit. 42 / 112 The Customer Edge rouler wants to use AS 100 as the preferred ISP for all external routes and ISP-2 as a backup. 43 / 112 After this configuration, all the backup routes have disappeared from the BGP table on the Customer Edge router. Which set of configurations resolves the issue on the Customer Edge router? A) B) C) 44 / 112 D) A. Option A B. Option B C. Option C D. Option D Answer: C 37. Refer to the exhibit. 45 / 112 An engineer has successfully set up a floating static route from the BRANCH router to the HQ network using HQ_R1 as the primary default gateway When the g0/0 goes down on HQ_R1, the branch network cannot reach the HQ network 192.168.20.0/24. Which set of configurations resolves the issue? A. HQ_R3(config)# ip sla responder HQ_R3(config)# ip sla responder icmp-echo 172.16.35.1 B. BRANCH(config)# ip sla 1 46 / 112 BRANCH(config-ip-sla)# icmp-echo 192.168.100.2 C. HQ R3(config)# Ip sla responder HQ R3(config)# Ip sla responder Icmp-echo 172.16.35.5 D. BRANCH(config)# Ip sla 1 BRANCH(config-ip-sta)# Icmp-echo 192.168.100.1 Answer: D 38. Which router attaches the VPN label to incoming packets from CE routing? A. CE router B. core router C. P router D. PE router Answer: D 39. Refer to the exhibit. A network administrator must block ping from user 3 to the App Server only. An inbound 47 / 112 standard access list is applied to R1 interface G0/0 to block ping. The network administrator was notified that user 3 cannot even ping user 9 anymore. Where must the access list be applied in the outgoing direction to resolve the issue? A. R2 interface G1/0 B. R2 interface G0/0 C. SW1 interface G1/10 D. SW1 interface G2/21 Answer: D 40. An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue? A. match the passwords B. match the hello timers C. match the MTUs D. match the network types Answer: C Explanation: 41. 4.0/24 42. Refer to the exhibit. The R1 and R2 configurations are: 48 / 112 The neighbor is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.) A. R2 ip route 10.1.1.1 255.255.255.255 192.168.1.1 ! router bgp 200 neighbor 10.1.1.1 tti-security hops 1 neighbor 10.1.1.1 update-source loopback 0 B. R2 ip route 10.1.1.1 255.255.255.255 192.168.1.1 ! router bgp 200 neighbor 10.1.1.1 disable-connected-check neighbor 10.1.1.1 update-source loopback 0 C. R2 ip route 10.1.1.2 255.255.255.255 192.168.1.2 ! router bgp 100 neighbor 10.1.1.2 ttl-securityhops 1 neighbor 10.1.1.2 update-source loopback 0 D. R1 ip route 10.1.1.2 255.255.255.255 192.168.1.2 ! router bgp 100 neighbor 10.1.1.1 ttl-security hops 1 neighbor 10.1.1.2 update-source loopback 0 E. R1 ip route 10.1.1.2 255.255.255.255 192.168.1.2 ! 49 / 112 router bgp 100 neighbor 10.1.1.2 disable-connected-check neighbor 10.1.1.2 update-source Loopback0 Answer: BE Explanation: Disable-connected-check enables a directly connected eBGP neighbor to peer using a loopback address without adjusting the default TTL of 1. In disable connected check the router does not decrease the TTL of an IP packet that is destined to itself so it only counts or considers as one hop between the two loopbacks of the routers. 43. Refer to the exhibit. 50 / 112 51 / 112 The remote server is failing to receive the NetFlow data. Which action resolves the issue? A. Modify the flow transport command transport udp 2055 to move under flow monitor profile. B. Modify the interlace command to Ip flow monitor FLOW-MONITOR-1 Input. C. Modify the udp port under flow exporter profile to Ip transport udp 4739. D. Modify the flow record command record v4_r1 to move under flow exporter profile. Answer: B Explanation: From the exhibit we see there are two flow monitors: the first one “FLOW-MONITOR-1” has been configured correctly but the second one “v4_r1” was left empty andinterface E0/0.1 is using it. So the remote server does not receive any NetFlow data. 44. Refer to the exhibit. An engineer configured NetFlow on R1, but the NMS server cannot see the flow from R1. Which configuration resolves the issue? A. flow monitor Flowmonitor1 destination 10.221.10.11 B. flow exporter FlowAnalyzer1 destination 10.221.10.11 C. interface Ethernet0/1 flow-destination 10.221.10.11 52 / 112 D. interface Ethernet0/0 flow-destination 10.221.10.11 Answer: B Explanation: From the output we notice that the destination IP address is not correct. The NMS server IP address should be 10.221.10.11, not 10.221.10.10. Therefore we have to change this information under “flow exporter …” configuration. NetFlow configuration reference: https://www.cisco.com/c/en/us/td/docs/iosxml/ios/fnetflow/confi guration/15-mt/fnf-15-mt-book/cfg-de-fnflow-exprts.html 45. Refer to the exhibit. An engineer configured user login based on authentication database on the router, but no one can log into the router. Which configuration resolves the issue? A. aaa authentication login default enable B. aaa authorization network default local C. aaa authentication login default local D. aaa authorization exec default local Answer: C 53 / 112 46. What is an advantage of using BFD? A. It detects local link failure at layer 1 and updates routing table. B. It detects local link failure at layer 2 and updates routing protocols. C. It has sub-second failure detection for layer 1 and layer 3 problems. D. It has sub-second failure detection for layer 1 and layer 2 problems. Answer: D 47. Refer to the exhibit. 54 / 112 An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved? A. Use the icmp-echo command to track both default routes B. Use the same AD for both default routes C. Start IP SLA by matching numbers for track and ip sla commands D. Start IP SLA by defining frequency and scheduling it Answer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/ip/ip-routing/200785-ISP-Failover-with- default-routes-using-I.html In the above configuration we have not had activated our IP SLA operation. We can start it with this command: R1(config)#ip sla schedule 100 life forever start-time now Also we should specific the rate of ICMP echo: R1(config-ip-sla-echo)#frequency 5 // Send ICMP echo every 5 seconds 48. Refer to the exhibit. When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface. Which command must be configured to resolve the issue? A. access-class INTERNET in B. ipv6 traffic-filter INTERNET in C. ipv6 access-class INTERNET in D. ip access-group INTERNET in Answer: C 49. Refer to the exhibit. 55 / 112 Gateway-Router# show ipv6 access-list IPv6 access list Default_Access permit tcp host 2018:DB1: A: B::1 host 2018:DB1:A:C::1 eq www sequence 10 deny tcp any host 2018:DB1: A:C::1 eq telnet sequence 20 permit tcp host 2018:DB1: A: B::2 host 2018:DB1:A:C::1 eq telnet sequence 30 permit ipv6 2018:DB1: A: B::/64 any sequence 40 PC-2 failed to establish a Telnet connection to the terminal server. Which configuration resolves the issue? A. Gateway-Router(config)#ipv6 access-list Default Access Gateway-Router(config-ipv6-acl)#sequence 15 permit tcp host 2018:DB1:A:B::2 host 2018:DB1:A:C. :1 eq telnet B. Gateway-Router(config)#ipv6 access-list Default Access Gateway-Router(config-ipv6-acl)#permit tcp host 2018:DB1:A:B::2 host 2018:DB1:A:C::1 eq telnet C. Gateway-Router(config)#ipv6 access-list Default Access Gateway-Router(config-ipv6-acl)#no sequence 20 Gateway-Router(config-ipv6-acl)#sequence 5 permit tcp host 2018:DB1:A:B::2 host 2018:DB1:A:C::1 eq telnet D. Gateway-Router(config)#fipv6 access-list Default Access Gateway-Router(confia-ipv6-acl)#sequence 25 permit tcp host 2018:DB1:A:B:2 host 2018:DB1:A:C. :1 eq telnet 56 / 112 Answer: A Explanation: In fact in this question both answer A and answer C are correct but we believe answer A is the better choice as it only allows PC-2 to telnet to terminal server. All other hosts are refused to telnet to terminal server via sequence 20. 50. Which two protocols are used by a P router to transfer VPN traffic between PE routers in an MPLS network? (Choose two.) A. BGP B. OSPF C. MP-BGP D. LDP E. RSVP Answer: CD 51. Refer to the exhibit. 57 / 112 58 / 112 R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths? A. Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2. B. Configure the variance 4 command under the EIGRP process on R2. C. Configure the delay 1 command under interface FastEthernet0/0 on R2. D. Configure the variance 2 command under the EIGRP process on R2 Answer: B Explanation: From the output of the “show ip eigrp topology …” command, we notice network 192.168.13.0/24 was learned via two routes: + From 192.168.23.3 (R3) with FD = 1075200 and AD = 281600 + From 192.168.12.1 (R1) with FD = 2611200 and AD = 281600 From the output of the “show ip route …” command, we learned that the best (and chosen) path is via 192.168.23.3 (R3). To use both paths (called unequal cost load balancing) with EIGRP, the second path via R1 must satisfy the feasibility condition. The feasibility condition states that, the Advertised Distance (AD) of a route must be lower than the feasible distance of the current successor route. In this case, the second path satisfies the feasible condition as its AD (281600) is smaller than the FD (1075200) of the best path. Therefore we can configure loadbalancing with “variance” command. In other words, EIGRP will install all paths with metric < variance * best_metric into the local routing table, provided that it meets the feasibility condition to preventrouting loop. Therefore we can calculate the variance > metric / best_metric = 2611200 / 1075200 =2.4. So with a variance greater than 2 (and must be an integer), we can load balance traffic to network 192.168.13.0/24. 52. R1 and R2 are configured as eBGP neighbor , R1 is in AS100 and R2 is in AS200. R2 is advertisingthese networks to R1: 53. Refer to the exhibit. 59 / 112 A user has set up an IP SLA probe to test if a non-SLA host web server on IP address 10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing. Which action should the network administrator recommend for the probe to succeed? A. Re-issue the ip sla schedule command. B. Add icmp-echo command for the host. C. Add the control disable option to the tcp connect. D. Modify the ip sla schedule frequency to forever. Answer: C 54. Refer to the exhibit. 60 / 112 The network engineer configured the summarization of the RIP routes into the OSPF domain on R5 but still sees four different 172.16.0.0/24 networks on R4. Which action resolves the issue? A. R5(config)#router ospf 1 R5(config-router)#no area R5(config-router)#summary-address 172.16.0.0 255.255.252.0 B. R4(config)#router ospf 99 R4(config-router)#network 172.16.0.0 0.255.255.255 area 56 R4(config-router)#area 56 range 172.16.0.0 255,255.255.0 C. R4(config)#router ospf 1 61 / 112 R4(config-router)#no area R4(config-router)#summary-address 172.16.0.0 255.255.252.0 D. R5(config)#router ospf 99 R5(config-router)#network 172.16.0.0 0.255.255.255 area 56 R5(config-router)#area 56 range 172.16.0.0 255.255.255.0 Answer: A Explanation: Explanation Area 36 is a NSSA so R5 is an ASBR so we can summarize external routes using the “summaryaddress” command. The command “area area-id range” can only be used on ABR so it is not correct. The summarization must be done on the ASBR which is R5, not R4 so the correct answer must be started with “R5(config)#router ospf 1”. Note: The “no area” command is used to remove any existing “area …” command (maybe “area 56 range …” command). 55. What is a function of the IPv6 DHCP Guard feature for DHCP messages? A. Only access lists are supported for matching traffic. B. All client messages are always switched regardless of the device role. C. It blocks only DHCP request messages. D. If the device is configured as a DHCP server, no message is switched. Answer: B 56. Refer to the exhibit. 62 / 112 In which circumstance does the BGP neighbor remain in the idle condition? A. if prefixes are not received from the BGP peer B. if prefixes reach the maximum limit C. if a prefix list is applied on the inbound direction D. if prefixes exceed the maximum limit Answer: D Explanation: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/25160-bgp- maximum-prefix.html#b 57. An engineer configured VRF-Lite on a router for VRF blue and VRF red. OSPF must be enabled on each VRF to peer to a directly connected router in each VRF. Which configuration forms OSPF neighbors over the network 10.10.10.0/28 for VRF blue and 192.168.0.0/30 for VRF red? 63 / 112 A. Option A B. Option B C. Option C D. Option D Answer: A 58. Refer to the exhibit. 64 / 112 The Math and Science departments connect through the corporate. IT router but users in the Math department must not be able to reach the Science department and vice versa. Which configuration accomplishes this task? A. vrf definition Science ? interface E 0/2 ip address 192.168.1.1 255.255.255.0 no shut ? interface E 0/3 ip address 192.168.2.1 255.255.255.0 no shut B. vrf definition Science address-family ipv4 ! interface E 0/2 ip address 192.168.1.1 255.255.255.0 65 / 112 vrf forwarding Science no shut ! interface E 0/3 ip address 192.168.2.1 255.255.255.0 vrf forwarding Science no shut C. vrf definition Science address-family ipv4 ! interface E 0/2 ip address 192.168.1.1 255.255.255.0 no shut ! interface E 0/3 ip address 192.168.2.1 255.255.255.0 no shut D. vrf definition Science address-family ipv4 ! interface E 0/2 vrf forwarding Science ip address 192.168.1.1 255.255.255.0 no shut ! interface E 0/3 vrf forwarding Science ip address 192.168.2.1 Answer: D 59. The network administrator configured the router for Control Plane Policing to limit OSPF traffic to be policed to 1 Mbps. Any traffic that exceeds this limit must also be allowed at this point for traffic analysis. The router configuration is: access-list 100 permit ospf any any ! 66 / 112 class-map CM-OSPF match access-group 100 ! policy-map PM-COPP class CM-OSPF police 1000000 conform-action transmit ! control-plane service-policy output PM-COPP The Control Plane Policing failed to monitor and police OSPF traffic. Which configuration resolves this issue? A. no access-list 100 access-list 100 permit tcp any any eq 179 access-list 100 permit ospf any any access-list 101 permit tcp any any range 22 23 ! ! class-map CM-MGMT no match access-group 100 match access-group 101 ! control-plane no service-policy output PM-COPP service-policy input PM-COPP B. No access-list 100 access-list 100 permit tcp any any eq 179 access-list 100 permit tcp any any range eq 22 access-list 100 permit tcp any any range eq 23 access-list 100 permit ospf any any C. control-plane no service-policy output PM-COPP service-policy input PM-COPP D. no access-list 100 access-list 100 deny ospf any any access-list 100 permit ip any any ! 67 / 112 policy-map PM-COPP class CM-OSPF no police 1000000 conform-action transmit police 1000000 conform-action transmit exceed-action drop ! control-plane no service-policy output PM-COPP service-policy input PM-COPP Answer: A 60. Refer to the exhibit. 68 / 112 A network engineer applied a filter for LSA traffic on OSPFv3 interarea routes on the area 5 ABR to protect advertising the internal routes of area 5 to the business partner network. All other areas should receive the area 5 internal routes. After the respective route filtering configuration is applied on the ABR, area 5 routes are not visible on any of the areas. How must the filter list be applied on the ABR to resolve this issue? A. in the “in” direction for area 5 on router R1 B. in the “out” direction for area 5 on router R1 69 / 112 C. in the “in” direction for area 20 on router R2 D. in the “out” direction for area 20 on router R2 Answer: D 61. An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted. Which action resolves the issue? A. Configure all devices for SNMPv3 informs with priv. B. Configure all devices for SNMPv3 informs with auth. C. Configure all devices for SNMPv3 traps with auth. D. Configure all devices for SNMPv3 traps with priv. Answer: A Explanation: SNMP notifications can be sent as traps or inform requests. Traps are unreliable because the receiver does not send acknowledgments when this device receives traps.”Send reliable and encrypted notifications for any events” so it is SNMP notifications. For encryption we need to configure “priv”. 62. A network administrator is troubleshooting a high utilization issue on the route processor of a router that was reported by NMS The administrator logged into the router to check the control plane policing and observed that the BGP process is dropping a high number of routing packets and causing thousands of routes to recalculate frequently. Which solution resolves this issue? A. Police the cir for BGP, conform-action transmit, and exceed action transmit. B. Shape the pir for BGP, conform-action set-prec-transmit, and exceed action set-frde-transmit. C. Shape the cir for BGP. conform-action transmit, and exceed action transmit. D. Police the pir for BGP, conform-action set-prec-transmit, and exceed action set-clp-transmit. Answer: D Explanation: CIR (Committed InformationRate) is the minimum guaranteed traffic delivered in the network. PIR (Peak Information Rate) is the top bandwidth point of allowed traffic in a non busy times without any guarantee. 70 / 112 + Policing: is used to control the rate of traffic flowing across an interface. During a bandwidth exceed (crossed the maximum configured rate), the excess traffic is generally dropped or remarked. The result of traffic policing is an output rate that appears as a saw-tooth with crests and troughs. Traffic policing can be applied to inbound and outbound interfaces. Unlike traffic shaping, QoS policing avoids delays due to queuing. Policing is configured in bytes. + Shaping: retains excess packets in a queue and then schedules the excess for later transmission over increments of time. When traffic reaches the maximum configured rate, additional packets are queued instead of being dropped to proceed later. Traffic shaping is applicable only on outbound interfaces as buffering and queuing happens only on outbound interfaces. Shaping is configured in bits per second. 71 / 112 Therefore in this case we can only policing, not shaping as traffic shaping is applicable only on outbound interfaces as buffering and queuing happens only on outbound interfaces. Moreover, BGP traffic is not important so we can drop the excess packets without any problems. And we only policing the PIR traffic so that the route processor is not overwhelmed by BGP calculation. Note: The “set-prec-transmit” is the same as “transmit” command except it sets the IP Precedence level as well. The “set-clp-transmit” sets the ATM Cell Loss Priority (CLP) bit from 0 to 1 on the ATM cell and transmits the packet. 63. Refer to the exhibit. 72 / 112 Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1? A. Configure EIGRP to receive 192.168.32.0 route with lower admin distance. B. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19. C. Configure EIGRP to receive 192.168.32.0 route with lower metric. D. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24. Answer: D 64. Refer to the exhibit. An engineer configured SNMP communities on the Core_SW1, but the SNMP server cannot obtain information from Core_SW1. Which configuration resolves this issue? A. snmp-server group NETVIEW v2c priv read NETVIEW access 20 B. access-list 20 permit 10.221.10.11 C. access-list 20 permit 10.221.10.12 D. snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22 Answer: B 65. Refer to the exhibit. 73 / 112 An engineer must block access to the console ports for all corporate remote Cisco devices based on the recent corporate security policy but the security team stilt can connect through the console port. Which configuration on the console port resolves the issue? A. transport input telnet B. login and password C. no exec D. exec 0.0 Answer: C Explanation: “no exec” will disable access to a line. It is used if we want to allow only outgoing session (and disable incoming session) so this command will block all console port access. There is no “exec 0 0” command. We can only find the “exec prompt” command in IOS Version 15.4(2)T4. 74 / 112 The most similar command is “exec-timeout 0 0” command, which is used to prevent Telnet/SSH sessions from timing out. 66. A company Is redesigning WAN infrastructure so that all branch sites must communicate via the head office and the head office can directly communicate with each site independently. The network engineer must configure the head office router by considering zero-touch technology when adding new sites in the same WAN infrastructure. Which configuration must be applied to the head office router to meet this requirement? A. Option A B. Option B C. Option C D. Option D Answer: D 67. Refer to the exhibit. 75 / 112 An engineer must configure a per VRF for TACACS+ for company A. Which configuration on RTG-1 accomplishes the task? 76 / 112 A. Option A B. Option B C. Option C D. Option D Answer: D 77 / 112 68. Network engineer must configure an ElGRP stub router at a site that advertises only connected and summary routes. Which configuration performs this task? A) B) C) D) A. Option A B. Option B C. Option C D. Option D Answer: B Explanation: In EIGRP (Enhanced Interior Gateway Routing Protocol), a stub router is one that is connected to one or more neighbors and should not be a transit router1. The EIGRP stub routing feature improves network stability, reduces resource utilization, and simplifies the stub router’s configuration1. The network engineer wants to configure an EIGRP stub router that advertises only connected and summary routes. This can be achieved with the configuration provided in Option B: 78 / 112 router eigrp 100 eigrp stub summary This configuration ensures that the EIGRP stub router advertises only connected and summary routes12. The summary keyword after the eigrp stub command indicates that the router should advertise only auto-summarized or statically configured summary routes12. Reference: EIGRP STUB and Configuration - Cisco Community EIGRP Stub And Summary Routes Explained - Networkel 69. Refer to the exhibit. After reloading the router an administrator discovered that the interface utilization graphs displayed inconsistencies with their previous history in the NMS. Which action prevents this issue from occurring after another router reload in the future? A. Rediscover all the router interfaces through SNMP after the router is reloaded B. Save the router configuration to startup-config before reloading the router C. Configure SNMP to use static OlDs referring to individual router interfaces D. Configure SNMP interface index persistence on the router Answer: D 70. Refer to the exhibit. 79 / 112 R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency? A. Remove the current autonomous system number on one of the routers and change to a different value. B. Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration. C. Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration. D. Add the passive-interface command to the R1 configuration so that it matches the R2 configuration. Answer: B 80 / 112 71. Topic 3, Exam Pool C Refer to the exhibit. A network administrator is trying to access a branch router using TACACS+ username and password credentials, but the administrator cannot log in to the router because the WAN connectivity is down. The branch router has following AAA configuration: aaa new-model aaa authorization commands 15 default group tacacs+ aaa accounting commands 1 default stop-only group tacacs+ aaa accounting commands 15 default stop-only group tacacs+ tacacs-server host 10.100.50.99 tacacs-server key CI$co123 Which command will resolve this problem when WAN connectivity is down? A. aaa authentication login default group tacacs+ local B. aaa authentication login default group tacacs+ enable C. aaa authentication login default group tacacs+ console D. aaa authentication login console group tacacs+ enable Answer: A Explanation: With the “aaa authentication login default group tacacs+ local ” command configured, when logging in, the password supplied will be attempted to be verified by the TACACS+ server before access is granted. If the server is unavailable/unreachable, then the switch will fall back to using the local authenticationdatabase. 81 / 112 72. Refer to the exhibit. The neighbor relationship is not coming up. Which two configurations bring the adjacency up? (Choose two) A. NY router ospf 1 area 0 authentication message-digest B. LA interface E 0/0 ip ospf message-digest-key 1 md5 Cisco123 C. NY interface E 0/0 no ip ospf message-digest-key 1 md5 Cisco123 ip ospf authentication-key Cisco123 D. LA interface E 0/0 ip ospf authentication-key Cisco123 E. LA router ospf 1 area 0 authentication message-digest Answer: BE Explanation: The configuration on NY router is good for OSPF authentication. So we must enable OSPF authentication on LA router with the following commands: router ospf 1 area 0 authentication message-digest 82 / 112 interface E0/0 ip ospf message-digest-key 1 md5 Cisco123 73. Refer to the exhibit. Packets arriving from source 209.165.200.215 must be sent with the precedence bit set to 1, and packets arriving from source 209.165.200.216 must be sent with the precedence bit set to 5. Which action resolves the issue? A. set ip precedence critical in route-map Texas permit 10 B. set ip precedence critical in route-map Texas permit 20 C. set ip precedence immediate in route-map Texas permit 10 D. set ip precedence priority in route-map Texas permit 20 Answer: B 74. Which IGPs are supported by the MPLS LDP autoconfiguration feature? 83 / 112 A. RIPv2 and OSPF B. OSPF and EIGRP C. OSPF and ISIS D. ISIS and RIPv2 Answer: C Explanation: 75. What are the two goals of micro BFD sessions? (Choose two.) A. The high bandwidth member link of a link aggregation group must run BFD B. Run the BFD session with 3x3 ms hello timer C. Continuity for each member link of a link aggregation group must be verified D. Eny member link on a link aggregation group must run BFD E. Each member link of a link aggregation group must run BFD. Answer: CE Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bfd/configuration/xe-16-8/irb- xe-16-8-book/irb-micro-bfd.html 76. How does LDP operate in an MPLS network? A. When topology changes occur such as a router failure, LDP generates peer discovery messages that terminate the LDP season to propagate an LSP change. B. When an adjacent LSR receives LDP discovery messages. TCP two-way handshake ensures that the LDP session has unidirectional connectivity. C. Peer routers establish the LDP session, and the LDP neighbors maintain and terminate the session by exchanging messages D. LDP notification messages allow LERs to exchange label information to determine the next hops within a particular LSP. Answer: D 77. Refer to the exhibit. 84 / 112 An engineer must configure OSPF with R9 and R10 and configure redistribution between OSPF and RIP causing a routing loop. Which configuration on R9 and R10 meets this objective? A) 85 / 112 B) C) D) 86 / 112 A. Option B. Option C. Option D. Option Answer: A 78. Refer to the exhibit. 87 / 112 An enterprise operations team must monitor all application server traffic in the data center. The team finds that traffic coming from the hub site from R3 and R6 rs monitored successfully but traffic destined to the application server is not monitored. Which action resolves the issue? A) B) 88 / 112 C) D) A. Option A B. Option B C. Option C D. Option D Answer: C 79. DRAG DROP Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right. 89 / 112 Answer: 90 / 112 80. Refer to the exhibit. After an engineer configured a new Cisco rouler as a DHCP server, users reponed two primary issues: ? Devices in the HR subnet have intermittent connectivity problems. ? Workstations in the LEGAL subnet cannot obtain IP addresses. Which configurations must the engineer apply to ROUTER_1 to restore connectivity for the affected devices? 91 / 112 92 / 112 93 / 112 94 / 112 A. Option A B. Option B C. Option C D. Option D Answer: A 81. Which function does LDP provide in an MPLS topology? A. It enables a MPLS topology to connect multiple VPNs to P routers. B. It provides hop-by-hop forwarding in an MPLS topology for LSRs. C. It exchanges routes for MPLS VPNs across different VRFs. D. It provides a means for LSRs to exchange IP routes. Answer: B Explanation: LDP provides a standard methodology for hop-by-hop, or dynamic label, distribution in an MPLS network by assigning labels to routes that have been chosen by the underlying Interior Gateway Protocol (IGP) routing protocols. The resulting labeled paths, called label switch paths (LSPs), forward label traffic across an MPLS backbone to particular destinations. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_ldp/configuration/12-4t/mp- ldp- 12-4t-book.pdf 82. Refer to the exhibit. 95 / 112 After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both spoke- to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.) A. Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3 B. Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3. C. Change the mode from mode tunnel to mode transport on R3 D. Change the mode from mode transport to mode tunnel on R2. E. Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3 Answer: AD Explanation: *When using DMVPN with IPSec, it is unnecessary to use tunnel mode. Because DMVPN uses GRE which means that a new IP header is already added by GRE. The GRE encapsulation happens on the tunnel interface before the encryption process takes place. 83. Which command is used to check IP SLA when an interface is suspected to receive lots of traffic with options? A. show track B. show threshold C. show timer D. show delay 96 / 112 Answer: A 84. What is an advantage of implementing BFD? A. BFD provides faster updates for any flapping route. B. BFD provides millisecond failure detection C. BFD is deployed without the need to run any routing protocol D. BFD provides better capabilities to maintain the routing table Answer: B 85. A network is configured with IP connectivity, and the routing protocol between devices started having problems right after the maintenance window to implement network changes. Troubleshoot and resolve to a fully functional network to ensure that: 97 / 112 98 / 112 99 / 112 100 / 112 R4 101 / 112 102 / 112 103 / 112 R5 104 / 112 105 / 112 106 / 112 107 / 112 Answer: R4 Int range et0/0 C 1 Ip ospf authentication message-digest Ip ospf message-digest-key 1 md5 CCNP Router ospf 1 108 / 112 Redistribute connected subnets route-map to-ospf metric-type 1 Copy run start R5 Int range et0/0 C 1 Ip ospf authentication message-digest Ip ospf message-digest-key 1 md5 CCNP Interface eth 0/1 Ip ospf cost 10 Copy run start VERIFICATION: - 86. An engineer configures PBR on R5 and wants to create a policy that matches traffic destined toward 10.10.10.0/24 and forward 10.1.1.1. The traffic must also have its IP precedence set to 5. All other traffic should be forward toward 10.1.1.2 and have its IP precedence set to 0. Which configuration meets the requirements?A. access-list 1 permit 10.10.10.0 0.0.0.255 access-list 2 permit any route-map CCNP permit 10 match ip address 1 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 match ip address 2 set ip next-hop 10.1.1.2 109 / 112 set ip precedence 0route-map CCNP permit 30 B. access-list 100 permit ip any 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 100 set ip next-hop 10.1.1.1 set ip precedence 0 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 5 ! route-map CCNP permit 30 C. access-list 1 permit 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 1 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 0 D. access-list 100 permit ip any 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 100 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 0 Answer: D 87. How is the LDP router ID used in an MPLS network? A. The MPLS LOP router ID must match the IGP router ID. B. If not configured, the operational physical interface is chosen as the router ID oven d a loopback is configured. 110 / 112 C. The loopback with the highest IP address is selected as the router ID D. The force keyword changes the router ID to the speeded address without causing any impact. Answer: D 88. Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a common fiber? A. shared risk link group-disjoint B. linecard-disjoint C. lowest-repair-path-metric D. interface-disjoint Answer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/ios- xml/ios/iproute_eigrp/configuration/xe-3s/asr1000/ire-xe-3s-asr1000/ire-ipfrr.html 89. Refer to the exhibit. The control plane is heavily impacted after the CoPP configuration is applied to the router. 111 / 112 Which command removal lessens the impact on the control plane? A. access-list 120 permit udp any any eq pim-auto-rp B. access-list 120 permit eigrp any host 224.0.0.10 C. access-list 120 permit ospf any D. access-list 120 permit tcp any gt 1024 eq bgp log Answer: A More Hot Exams are available. 350-401 ENCOR Exam Dumps 350-801 CLCOR Exam Dumps 200-301 CCNA Exam Dumps Powered by TCPDF (www.tcpdf.org) 112 / 112 https://www.certqueen.com/promotion.asp https://www.certqueen.com/350-401.html https://www.certqueen.com/350-801.html https://www.certqueen.com/200-301.html http://www.tcpdf.org